Home / Blog / Filter / Blog
Subscribe to CERTSI - Blog RSS


Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: iOS

Protect your DNS requests with DNS over TLS

Posted on 07/04/2019, by Ignacio Porro Sáez (INCIBE)
Security breaches that put our privacy at risk, leaks of our data, passwords... are incidents that happen more and more often. Protecting ourselves from these information leaks is often beyond our reach, but this does not mean that we should not try to take measures to protect our data. DNS-over-TLS can be very helpful in encrypting our communications, making them much more secure.
Portada greatest hits 2016

Greatest Hits 2016

Posted on 01/23/2017, by Miguel Herrero (INCIBE)
El aim of Cybersecurity Highlights service is to gather all relevant news related to cybersecurity through the year. This is the article that summarizes those news that have been more important in 2016.

Comparative study of mobile architectures

Posted on 05/31/2016, by Asier Martínez (INCIBE)
The following article shall outline the most significant technical specifications of the main mobile platforms. Accordingly, the 4 most widely used mobile platforms are going to be taken into account based on their market share: Android, iOS, Windows Phone and BlackBerry OS.

OS X security model (II)

Posted on 02/18/2016, by Antonio López (INCIBE)
In the article: Security Model in OS X (I), we introduced the operating system’s main accumulated security features accumulated up to Yosemite (OS X 10.10). With the latest version, launched in September 2015, an interesting new security feature appears in the system. System Integrity Protection (SIP) As of OS X 10.11 (El Capitan), Apple is tightening security measures even further with the...
OS X security model (I)

OS X security model (I)

Posted on 02/11/2016, by INCIBE
Security measures in OS X have been incorporated into the operating system base, with functions added and improved upon as different versions are published. Together,these measures form a layered model that reinforce the basic outline of typical POSIX permissions and provides a mechanism covering various aspects of protection against security threats. Let’s see how this system works. First line...
2015 Cybersecurity Highlights

2015 Cybersecurity Highlights log

Posted on 01/28/2016, by David Cantón (INCIBE)
Nobody can deny that computer security is a vital issue in our lives, affecting all of us. It is not uncommon to see articles on themes related to or speaking directly about computer security in newspapers or mainstream publications. The INCIBE_ Cybersecurity Highlights log aims to gather together articles published on events or incidents related to computer security based on their importance...